CVE-2025-36460: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X
Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 2 (`WBIO_USH_GET_IDENTITY`) with an improper `ReceiveBuferSize` value.
AI Analysis
Technical Summary
CVE-2025-36460 is a vulnerability classified under CWE-805 (Buffer Access with Incorrect Length Value) affecting the Broadcom BCM5820X Storage Adapter functionality embedded in Dell ControlVault3 and ControlVault3 Plus devices prior to versions 5.15.14.19 and 6.2.36.47 respectively. The flaw arises from improper handling of the ReceiveBufferSize parameter in the WinBioControlUnit API call, specifically when the ControlCode 2 (WBIO_USH_GET_IDENTITY) is used. This leads to multiple out-of-bounds read and write operations, causing memory corruption. The vulnerability can be triggered by an attacker with limited privileges (PR:L) who can issue the crafted API call, requiring user interaction (UI:R). The CVSS v3.1 score is 7.3, indicating high severity with impacts on confidentiality, integrity, and availability. The vulnerability is local access vector (AV:L), meaning exploitation requires local access to the system. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects the underlying Broadcom BCM5820X hardware integrated into Dell's ControlVault security modules, which are used for secure authentication and cryptographic operations. Successful exploitation could allow attackers to corrupt memory, potentially leading to privilege escalation, data leakage, or denial of service conditions.
Potential Impact
The vulnerability poses a significant risk to organizations relying on Dell ControlVault3 and ControlVault3 Plus devices that incorporate the Broadcom BCM5820X Storage Adapter. Exploitation can lead to memory corruption, which may result in unauthorized disclosure of sensitive biometric or cryptographic data, privilege escalation, or system crashes causing denial of service. This can compromise the security of authentication mechanisms and cryptographic operations, undermining the integrity and confidentiality of protected systems. Given the local access requirement and user interaction, the attack surface is somewhat limited, but insider threats or malware with user-level access could exploit this flaw. The impact is especially critical in environments where ControlVault devices are used to secure sensitive authentication credentials or cryptographic keys, such as enterprise IT infrastructure, government agencies, and critical infrastructure sectors.
Mitigation Recommendations
Organizations should immediately inventory their use of Dell ControlVault3 and ControlVault3 Plus devices to identify affected versions. Until patches are available, restrict local access to systems with these devices, especially limiting user accounts that can invoke the WinBioControlUnit API. Employ application whitelisting and endpoint protection to prevent execution of unauthorized code that could trigger the vulnerability. Monitor system logs for unusual calls to the WinBioControlUnit API with ControlCode 2 and anomalous ReceiveBufferSize values. Coordinate with Dell and Broadcom for timely patch releases and apply updates as soon as they become available. Additionally, consider isolating critical systems using these devices from less trusted networks and users to reduce the risk of exploitation. Conduct regular security assessments and penetration testing focusing on biometric and authentication subsystems to detect potential exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Netherlands
CVE-2025-36460: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X
Description
Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 2 (`WBIO_USH_GET_IDENTITY`) with an improper `ReceiveBuferSize` value.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-36460 is a vulnerability classified under CWE-805 (Buffer Access with Incorrect Length Value) affecting the Broadcom BCM5820X Storage Adapter functionality embedded in Dell ControlVault3 and ControlVault3 Plus devices prior to versions 5.15.14.19 and 6.2.36.47 respectively. The flaw arises from improper handling of the ReceiveBufferSize parameter in the WinBioControlUnit API call, specifically when the ControlCode 2 (WBIO_USH_GET_IDENTITY) is used. This leads to multiple out-of-bounds read and write operations, causing memory corruption. The vulnerability can be triggered by an attacker with limited privileges (PR:L) who can issue the crafted API call, requiring user interaction (UI:R). The CVSS v3.1 score is 7.3, indicating high severity with impacts on confidentiality, integrity, and availability. The vulnerability is local access vector (AV:L), meaning exploitation requires local access to the system. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects the underlying Broadcom BCM5820X hardware integrated into Dell's ControlVault security modules, which are used for secure authentication and cryptographic operations. Successful exploitation could allow attackers to corrupt memory, potentially leading to privilege escalation, data leakage, or denial of service conditions.
Potential Impact
The vulnerability poses a significant risk to organizations relying on Dell ControlVault3 and ControlVault3 Plus devices that incorporate the Broadcom BCM5820X Storage Adapter. Exploitation can lead to memory corruption, which may result in unauthorized disclosure of sensitive biometric or cryptographic data, privilege escalation, or system crashes causing denial of service. This can compromise the security of authentication mechanisms and cryptographic operations, undermining the integrity and confidentiality of protected systems. Given the local access requirement and user interaction, the attack surface is somewhat limited, but insider threats or malware with user-level access could exploit this flaw. The impact is especially critical in environments where ControlVault devices are used to secure sensitive authentication credentials or cryptographic keys, such as enterprise IT infrastructure, government agencies, and critical infrastructure sectors.
Mitigation Recommendations
Organizations should immediately inventory their use of Dell ControlVault3 and ControlVault3 Plus devices to identify affected versions. Until patches are available, restrict local access to systems with these devices, especially limiting user accounts that can invoke the WinBioControlUnit API. Employ application whitelisting and endpoint protection to prevent execution of unauthorized code that could trigger the vulnerability. Monitor system logs for unusual calls to the WinBioControlUnit API with ControlCode 2 and anomalous ReceiveBufferSize values. Coordinate with Dell and Broadcom for timely patch releases and apply updates as soon as they become available. Additionally, consider isolating critical systems using these devices from less trusted networks and users to reduce the risk of exploitation. Conduct regular security assessments and penetration testing focusing on biometric and authentication subsystems to detect potential exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-04-15T21:17:08.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ba72ebb922d226277cd87
Added to database: 11/17/2025, 10:52:30 PM
Last enriched: 2/27/2026, 5:06:07 AM
Last updated: 3/24/2026, 7:01:30 AM
Views: 97
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.